Remember the public outcry for the release of the White House's secret beer recipe? It eventually led to the release of two beer recipes, White House Honey Ale and Honey Porter, in September. Now, after about a month of boiling, cooling, fermenting and settling— the verdict is in: It's delicious! Cue New York Times wine critic Eric Asimov for a review of the Honey Ale:

The aromas were floral with a touch of orange and a metallic note that I sometimes find in honey. On the palate, it was breezy, fresh, tangy and lightly bitter, not bone dry but not at all sweet. I could sense the honey in the round, rich texture of the beer: thickness without weight, like a chenin blanc wine. The soft carbonation enhanced the texture. It didn’t have the insistent rush of bubbles that you would find in a mass-produced beer, or the snappy twang of a pilsner, but rather the soft fizz of a British hand-cranked cask ale ... The verdict: It was good. Very good.

Now that's some pretty fancy verbiage, but fear not: The 4.89 percent alcohol drink will please a wide-range of drinkers "from novices to aficionados," says Asimov. The Times didn't waste much time in getting its hands on the beer. Last month, it tapped Brooklyn Brewery's brewmaster Garret Oliver to get things going (full disclosure: my brother works there) after the release of the recipe.

By using this service you agree not to post material that is obscene, harassing, defamatory, or
otherwise objectionable. Although GovExec.com does not monitor comments posted to this site (and
has no obligation to), it reserves the right to delete, edit, or move any material that it deems
to be in violation of this rule.

Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.